René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

174 lines
5.8 KiB
JSON

{
"id": "CVE-2006-4120",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-14T23:04:00.000",
"lastModified": "2017-07-20T01:32:51.320",
"vulnStatus": "Modified",
"evaluatorSolution": "If you do not use the Recipe Module, or use Recipe Module version 1.54 or later, you are not affected by this vulnerability.\r\nThis vulnerability has been addressed in the latest patch for:\r\nDrupal, Drupal, 4.6",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Recipe module (recipe.module) before 1.54 for Drupal 4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Recipe (recipe.module) anterior a 1.54 para Drupal 4.6 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6",
"matchCriteriaId": "37A224F5-AD67-44F8-BB77-214879E81429"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09A73149-677F-4112-95DF-04CFC94E46FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFF99BC-5E1D-4ADA-8BE7-07F7761C972C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA805CAF-A678-43A9-932D-EE35DBCCA793"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18331C39-0ACE-4651-9D9F-1533AAD7C58C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD40E38-71BA-42AD-BEBB-D4AD05ADDF6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82317650-F136-446D-904D-354B4D26E91B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06A1ACAF-A468-43F0-9FAD-FA3D48363843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A68656D9-3EA0-4749-AF1B-2F9B485A02ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEDAA48-3F53-4B13-BB6A-CDC63E3922A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6946291-0F27-4666-95C8-E744800D3EFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "79713A65-5A3A-4682-8A49-614174AB7C6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:drupal:4.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4E42FFA3-6FAE-4764-AF83-F544E6BA6CA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:recipe_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.53",
"matchCriteriaId": "7A08F0C9-476D-41A1-9951-916AF53DB9AB"
}
]
}
]
}
],
"references": [
{
"url": "http://drupal.org/node/77538",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://drupal.org/node/77753",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/19422",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3202",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28490",
"source": "cve@mitre.org"
}
]
}